SE539602C2 - Generating a symmetric encryption key - Google Patents
Generating a symmetric encryption key Download PDFInfo
- Publication number
- SE539602C2 SE539602C2 SE1451210A SE1451210A SE539602C2 SE 539602 C2 SE539602 C2 SE 539602C2 SE 1451210 A SE1451210 A SE 1451210A SE 1451210 A SE1451210 A SE 1451210A SE 539602 C2 SE539602 C2 SE 539602C2
- Authority
- SE
- Sweden
- Prior art keywords
- terminal
- key data
- key
- ckd
- processing file
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451210A SE539602C2 (en) | 2014-10-09 | 2014-10-09 | Generating a symmetric encryption key |
US15/516,939 US10348498B2 (en) | 2014-10-09 | 2015-10-08 | Generating a symmetric encryption key |
PCT/SE2015/051066 WO2016056987A1 (fr) | 2014-10-09 | 2015-10-08 | Génération d'une clé de cryptage symétrique |
EP15849717.2A EP3205048B1 (fr) | 2014-10-09 | 2015-10-08 | Génération d'une clé de cryptage symétrique |
TW104133308A TW201626752A (zh) | 2014-10-09 | 2015-10-08 | 產生對稱加密密鑰 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451210A SE539602C2 (en) | 2014-10-09 | 2014-10-09 | Generating a symmetric encryption key |
Publications (2)
Publication Number | Publication Date |
---|---|
SE1451210A1 SE1451210A1 (en) | 2016-04-10 |
SE539602C2 true SE539602C2 (en) | 2017-10-17 |
Family
ID=55653453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE1451210A SE539602C2 (en) | 2014-10-09 | 2014-10-09 | Generating a symmetric encryption key |
Country Status (5)
Country | Link |
---|---|
US (1) | US10348498B2 (fr) |
EP (1) | EP3205048B1 (fr) |
SE (1) | SE539602C2 (fr) |
TW (1) | TW201626752A (fr) |
WO (1) | WO2016056987A1 (fr) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE542460C2 (en) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE540133C2 (en) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
US11153077B2 (en) * | 2018-12-14 | 2021-10-19 | Westinghouse Air Brake Technologies Corporation | Secure vehicle to vehicle communication |
WO2020072474A1 (fr) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systèmes et procédés d'authentification cryptographique des cartes sans contact |
CA3115084A1 (fr) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systemes et procedes d'authentification cryptographique de cartes sans contact |
US11356425B2 (en) * | 2018-11-30 | 2022-06-07 | Paccar Inc | Techniques for improving security of encrypted vehicle software updates |
GB201912132D0 (en) * | 2019-08-23 | 2019-10-09 | Angoka Ltd | Symmetric key generation, authentication and communication betwenn a plurality of entities in a network |
IL294643A (en) * | 2020-01-10 | 2022-09-01 | Zeu Tech Inc | A method for symmetric asynchronous generative encryption |
US10915888B1 (en) | 2020-04-30 | 2021-02-09 | Capital One Services, Llc | Contactless card with multiple rotating security keys |
CN115580440A (zh) * | 2022-09-19 | 2023-01-06 | 中国银联股份有限公司 | 一种数据共享系统、方法、装置、设备及介质 |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4578531A (en) | 1982-06-09 | 1986-03-25 | At&T Bell Laboratories | Encryption system key distribution method and apparatus |
US7298851B1 (en) | 1992-12-09 | 2007-11-20 | Discovery Communications, Inc. | Electronic book security and copyright protection system |
US20020159598A1 (en) | 1997-10-31 | 2002-10-31 | Keygen Corporation | System and method of dynamic key generation for digital communications |
US7079653B2 (en) | 1998-02-13 | 2006-07-18 | Tecsec, Inc. | Cryptographic key split binding process and apparatus |
AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
US7043633B1 (en) | 2000-08-28 | 2006-05-09 | Verizon Corporation Services Group Inc. | Method and apparatus for providing adaptive self-synchronized dynamic address translation |
IL144369A (en) | 2001-07-17 | 2009-06-15 | Eli Yanovsky | Secure communication system and method using shared random source for key changing |
US20030145203A1 (en) | 2002-01-30 | 2003-07-31 | Yves Audebert | System and method for performing mutual authentications between security tokens |
US7350079B2 (en) | 2003-11-20 | 2008-03-25 | International Business Machines Corporation | Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs |
US20070186099A1 (en) | 2004-03-04 | 2007-08-09 | Sweet Spot Solutions, Inc. | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method |
WO2006012058A1 (fr) | 2004-06-28 | 2006-02-02 | Japan Communications, Inc. | Systemes et procedes d'authentification mutuelle de reseau |
KR20060131536A (ko) | 2005-06-16 | 2006-12-20 | 삼성전자주식회사 | BE 시스템에서의 홈 디바이스의 통합적 키(key) 관리방법 및 그 시스템 |
JP5424008B2 (ja) | 2006-12-19 | 2014-02-26 | 日本電気株式会社 | 共有情報の管理方法およびシステム |
US20080235513A1 (en) | 2007-03-19 | 2008-09-25 | Microsoft Corporation | Three Party Authentication |
WO2009060283A1 (fr) | 2007-11-05 | 2009-05-14 | Synaptic Laboratories Limited | Procédé et appareil pour une communication sécurisée |
US20100318802A1 (en) | 2007-11-20 | 2010-12-16 | Ajit Balakrishnan | Systems and methods for establishing a secure communication channel using a browser component |
AU2009204512B2 (en) | 2008-01-07 | 2014-06-12 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
US8302167B2 (en) | 2008-03-11 | 2012-10-30 | Vasco Data Security, Inc. | Strong authentication token generating one-time passwords and signatures upon server credential verification |
FR2928798B1 (fr) | 2008-03-14 | 2011-09-09 | Centre Nat Rech Scient | Procede d'authentification, systeme d'authentification, terminal serveur, terminal client et programmes d'ordinateur correspondants |
US8422687B2 (en) | 2008-05-30 | 2013-04-16 | Lantiq Deutschland Gmbh | Key management for communication networks |
US9344438B2 (en) | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
US8751829B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Dispersed secure data storage and retrieval |
US8752153B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Accessing data based on authenticated user, provider and system |
US8588410B2 (en) | 2009-04-06 | 2013-11-19 | Elster Electricity, Llc | Simplified secure symmetrical key management |
US20100312810A1 (en) | 2009-06-09 | 2010-12-09 | Christopher Horton | Secure identification of music files |
US9219612B2 (en) | 2009-06-26 | 2015-12-22 | France Telecom | Method of mutually authenticating a reader and a radio tag |
SE534384C2 (sv) | 2009-07-03 | 2011-08-02 | Kelisec Ab | Förfarande för att alstra en krypterings-/dekrypteringsnyckel |
AU2011205391B2 (en) | 2010-01-12 | 2014-11-20 | Visa International Service Association | Anytime validation for verification tokens |
WO2011128183A2 (fr) | 2010-04-13 | 2011-10-20 | Telefonaktiebolaget L M Ericsson (Publ) | Procédé et appareil pour l'interfonctionnement avec une architecture d'authentification d'ouverture de session |
EP2651072A3 (fr) | 2010-09-20 | 2013-10-23 | Security First Corp. | Systèmes et procédés de partage de données sécurisé |
US9100188B2 (en) | 2011-04-18 | 2015-08-04 | Bank Of America Corporation | Hardware-based root of trust for cloud environments |
KR101800659B1 (ko) | 2011-07-08 | 2017-11-23 | 삼성전자 주식회사 | 이동 통신 시스템에서 단말 설정 방법 |
US8914635B2 (en) | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
FR2983374B1 (fr) | 2011-11-29 | 2015-04-10 | Oberthur Technologies | Protocole d'authentification mutuelle |
US8656180B2 (en) | 2011-12-06 | 2014-02-18 | Wwpass Corporation | Token activation |
WO2013122869A1 (fr) | 2012-02-13 | 2013-08-22 | Eugene Shablygin | Partage de données sécurisées |
US20130219481A1 (en) | 2012-02-16 | 2013-08-22 | Robert Matthew Voltz | Cyberspace Trusted Identity (CTI) Module |
EP2663051A1 (fr) | 2012-05-07 | 2013-11-13 | Industrial Technology Research Institute | Sytème d'authentification pour communications de dispositif à dispositif et procédé correspondant |
US20140149742A1 (en) | 2012-11-28 | 2014-05-29 | Arnold Yau | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
JP6018511B2 (ja) | 2013-01-31 | 2016-11-02 | 株式会社東芝 | サーバ装置、グループ鍵通知方法及びそのプログラム |
AU2014216207A1 (en) | 2013-02-13 | 2015-09-10 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9397836B2 (en) | 2014-08-11 | 2016-07-19 | Fisher-Rosemount Systems, Inc. | Securing devices to process control systems |
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE542460C2 (en) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE540133C2 (en) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE539271C2 (en) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
-
2014
- 2014-10-09 SE SE1451210A patent/SE539602C2/en unknown
-
2015
- 2015-10-08 US US15/516,939 patent/US10348498B2/en not_active Expired - Fee Related
- 2015-10-08 WO PCT/SE2015/051066 patent/WO2016056987A1/fr active Application Filing
- 2015-10-08 TW TW104133308A patent/TW201626752A/zh unknown
- 2015-10-08 EP EP15849717.2A patent/EP3205048B1/fr not_active Not-in-force
Also Published As
Publication number | Publication date |
---|---|
WO2016056987A1 (fr) | 2016-04-14 |
US20170295016A1 (en) | 2017-10-12 |
EP3205048B1 (fr) | 2019-08-21 |
EP3205048A1 (fr) | 2017-08-16 |
TW201626752A (zh) | 2016-07-16 |
EP3205048A4 (fr) | 2018-05-30 |
SE1451210A1 (en) | 2016-04-10 |
US10348498B2 (en) | 2019-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693848B2 (en) | Installation of a terminal in a secure system | |
EP3205048B1 (fr) | Génération d'une clé de cryptage symétrique | |
US10356090B2 (en) | Method and system for establishing a secure communication channel | |
US10511596B2 (en) | Mutual authentication | |
US10733309B2 (en) | Security through authentication tokens | |
JP2017521934A (ja) | クライアントとサーバとの間の相互検証の方法 | |
US20200195446A1 (en) | System and method for ensuring forward & backward secrecy using physically unclonable functions | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
WO2018047132A1 (fr) | Système et procédé d'authentification et de communication sécurisée | |
Huang et al. | A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment | |
US20240267224A1 (en) | Cyber security method and system based on multi-party and multi-factor dynamic strong encryption authentication | |
Singh et al. | Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System | |
Zakir et al. | A Survey on Various Encryption/Decryption Techniques Used in Mobile and Cloud Computing | |
TW202433321A (zh) | 基於多方多因子動態強加密認證之資通安全方法與系統 | |
Zeb | Enhancement in TLS authentication with RIPEMD-160 | |
Lee et al. | Security analysis and improvement of an anonymous authentication scheme for roaming services |